If you're staring down an ever-growing mountain of data and still working on plans for containing it, you're not alone. But climbing to this particular summit requires a lot more than just technology: rather, taking full advantage of enterprise data requires nothing short of a transformation in the way the business operates.
Stories by David Braue
While the complexity of the searching and result-ranking technology behind Apple's Siri would likely elude most of its users, the value of a context-sensitive personal assistant certainly has not.
The annual World Backup Day, which came and went on March 31 without much fanfare, is designed as a reminder for good data hygiene. Yet for companies where backup is not only good hygiene but crucial to the survival of the business, each successive event is a stark reminder that the overwhelming flood of data is only getting stronger.
Just as accepted definitions of what DevOps entails have morphed and grown over the years, so too have the toolsets and management approaches employed to build and manage a DevOps culture within the organisation.
Cloud technologies have been fundamentally transformational for financial software provider MYOB, which like most legacy software providers has undergone a massive period of change in recent years as it shifted its architecture to the cloud.
Just when you thought it was safe to go back and visit your developers, along comes a new buzzword to empower your software processes and raise eyebrows at boardroom meetings. That buzzword is DevOps – a portmanteau of 'development' and 'operations' – and it is already revolutionising the way many IT organisations work.
Critical infrastructure operators remain vulnerable to attack from hackers whose motivations have matured from the “pretty juvenile” wanton vandalism of the 1990s to the aggressive, targeted and financially-motivated cyber war being waged online today, a one-time senior security advisor to the US president has warned.
It wasn’t too long ago that security vendors were touting new ‘heuristic’, or behaviour based, analysis as a newfangled way to spot new viruses that were generated by hacker toolkits and didn’t match any known signature on file. These days, however, heuristics are less a luxury than the standard operating procedure as globally connected malware authors spew new threats faster than ever and even the most diligent companies continue to suffer the indignity of successful security attacks.
Australian enterprises may be rushing to embrace cloud computing, but those making the transition must take a proactive approach to infrastructure security that lets them provide consistent information assurance across public, private and hybrid cloud models.
Cyber-attacks may have been adjudged to be one of the most serious security threats facing the world, and the nasties out there were certainly doing their part to make sure we didn't forget it. Credit-card payments processor Global Payments said that fewer than 1.5 million cards were affected by the recent data theft, but struggled with its corporate messaging in the wake of the significant breach. .
Cyber-attacks have outrated nearly every other type of threat in a risk assessment published by the World Economic Forum, reiterating the importance of proactive security measures over the next 10 years.
The use of Facebook and Google credentials to log onto multiple services has been heralded as a benchmark in service integration, but a recent study has shown the protocols used to facilitate such logins remain woefully inadequate. This is a significant weak point in cloud-based services, while Microsoft's decision to release an anti-malware tool for its Azure cloud service seems to counter the company's own advice that one of Azure's benefits is to avoid reliance on security software.
It’s hard to swing the proverbial cat these days without hitting a half-dozen consultants urging you to move your business into the Cloud. Yet as vendors reposition themselves around Cloud-delivery models and holdouts gradually warm to the promise of the Cloud, early adopters are reporting back from the front – and many are quite happy with what they’ve accomplished.
It may be relatively painless when one or two employees embrace Google’s Gmail and related Docs applications, but transitioning an entire organisation to the online services is another thing entirely. Just ask Ben White, who has seen both highs and lows during his company’s shift from an aging Outlook and Exchange environment to the Cloud-hosted Google solutions.
- Portfolio Manager NSW
- Windows 10 Deployment Team Lead VIC
- Reporting Consultant with Alteryx Other
- Cyber Security Consultant - IT Services - North Ryde area NSW
- IT Security Technical Business Analyst Other
- IBM Tivoli Network Configuration lead VIC
- Data Business Analyst NSW
- Cyber/Forensic Security Analyst ACT
- Security Consultant - Security SDM NSW
- Senior Business Analyst - investment banking VIC
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud